interaction 2015: j boye - data boundaries: enabling cohesive workspaces
TRANSCRIPT
Data boundaries
enabling cohesive workplaces
J. BoyeInternational network for digital
professionals
@jboye@emmottion
Knowledge sharing peer-groups – these groups focus on different areas including content strategy, digital communication, web project management, collaboration, intranet and many more;
Annual web & intranet conferences;
Consulting on a range of issues, including vendor selection, strategy development and project management; and
Independent research & product evaluations.
Stephen Emmott
Head of Research, J. Boye
As Head of Research, I'm J. Boye's principal analyst.
Started working professionally with web/digital in 1995, at early ISP Easynet and web agencies NetMare and Webmedia, before going on to lead web/digital for King's College London and LSE.
Specialisms include digital governance, data analysis and insight, product development, editorial, content strategy, and project management.
How do employers fitwithin the digital lives oftheir employees?
Context
Governance
Governance
Management
Bridge
Policy
Explicit policy ⚖> ½
for personal devices?
Explicit policyfor personal accounts?
✓½ - ¾
Explicit policyfor personal accounts?
⨯0
Disclosure
Disclosethese policies?
⨯> 0
Usage
Usagesocial login?
⨯> 0
UsageBYOD?
⚖½
Usagefrom home?
✓> ¾
Usagecloud services?
⚖< ½
Usagesocial networking?
✓> ¾
Strategy
Intranet/digital workplace strategy
consider personal accounts?
⨯> ½
Observations
LinkedIn as a source for employee profile data.
Variation of constraints across countries/regions
‘Containerisation’ of applications and data on personal devices.
Facebook and LinkedIn used for communicating and promoting brand, externally.
Support for purchase of personal mobile devices.
Insights
Clear line between personal and work.
Work presence on personal devices (office, move, and home); not vice versa!
Social media is understood, and governed (by policy).
Cloud services are tackled reactively and ad hoc.
Risk, rather than opportunity, drives policy.
So, what next?
Revisit what mobile means in the context of device policies.
Check policies and consider personal accounts.
Consider edge cases.
Explore use of ‘third party service’ accounts for work.
Questions?
Thank you